On September 11th, CISA issued a massive security update, publishing eleven industrial control systems advisories, and at the same time, it added another harmful vulnerability to its Known Exploited Vulnerabilities list, a move that underscores the cybersecurity threats currently facing critical infrastructure and manufacturing systems throughout the industrial sector of America.
Severe industrial control systems weaknesses revealed
The official alert of CISA said that eleven Industrial Control Systems (ICS) advisories were released by the agency on September 11, 2025. These recommendations present up-to-date information regarding existing security concerns, weaknesses, and vulnerabilities in relation to ICS. Most of the advisories focus on Siemens products, and seven individual warnings are issued with different industrial automation and control systems.
Some of the Siemens advisories consist of SIMOTION Tools, SIMATIC Virtualization as a Service, SINAMICS Drives, SINEC OS, Apogee PXC, and Talon TC Devices, Industrial Edge Management OS, and User Management Component. The systems are commonly found in factories, power stations, and other installations of important infrastructure in the world.
Schneider Electric and Daikin were also affected
Three more advisories are related to the Schneider Electric products, such as EcoStruxure systems and specific network modules on the controllers under the Modicon M340. The last recommendation is about the vulnerability of Daikin Security Gateway systems. CISA advises users and administrators to read and review the latest ICS advisories issued to get technical details and mitigation.
The systems of industrial control are the foundation of the critical infrastructure of America (power grids, water treatment plants, and so forth). In case these systems have vulnerabilities, they might enable attackers to interfere with the operations, steal confidential information, or even cause damage to the equipment. CISA will keep on adding vulnerabilities to the catalog that qualify to be actively exploited.
New CVE brought to the Known Exploited Vulnerabilities catalog
On the evidence of active exploitation, CISA has included one new vulnerability in its Known Exploited Vulnerabilities (KEV) Catalog. The latest vulnerability is CVE-2025-5086, used in Dassault Systรจmes DELMIA Apriso, and it is associated with the deserialization of untrusted data vulnerability.
This kind of vulnerability is a common attack point for malicious cyber players, and it is a high threat to the federal enterprise. KEV Catalog is a living list of the known Common Vulnerabilities and Exposures that are highly risky to federal networks and systems.
Federal agencies are subject to compulsory cleanup
The KEV Catalog was developed based on Binding Operational Directive (BOD) 22-01 as a highly significant tool that minimizes cybersecurity risks. The directive compels the agencies of the Federal Civilian Executive Branch to address the vulnerabilities that are identified with corresponding due dates to counter active threats to the federal networks.
Even though BOD 22-01 is only applicable to federal agencies, CISA highly encourages all organizations to minimize their vulnerability to cyberattacks by focusing on the prompt remediation of KEV Catalog vulnerabilities as an aspect of vulnerability management.
The increasing cyber threats are directed at critical infrastructure
Dassault Systรจmes vulnerability is of more concern to manufacturing and aerospace industries, where DELMIA Apriso systems are used in controlling complex production processes. The deserialization vulnerabilities may enable attackers to inject arbitrary code into the systems, which may result in total compromise of the systems. CISA will keep on adding vulnerabilities to the catalog that qualify to be actively exploited.
The twofold announcement of the agency highlights how the threat of cybersecurity facing industrial systems is persistent and dynamic. As critical infrastructure starts to become networked, these vulnerabilities are a significant issue of national security that must be immediately addressed by both government bodies and the organizations in the private sector that provide the most vital services in the manufacturing, energy, and transportation industries.